Analysis
-
max time kernel
179s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 21:30
Static task
static1
Behavioral task
behavioral1
Sample
e49d7ba2eef850d96b19d3998d71f7acca2c48ee6cdb47a4901622793f7a66e9.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e49d7ba2eef850d96b19d3998d71f7acca2c48ee6cdb47a4901622793f7a66e9.dll
Resource
win10v2004-20221111-en
General
-
Target
e49d7ba2eef850d96b19d3998d71f7acca2c48ee6cdb47a4901622793f7a66e9.dll
-
Size
33KB
-
MD5
96bdd8db7f52fff49c6b743e8194e36c
-
SHA1
865e1cbb53932482a899e23ec76790e8f7427a56
-
SHA256
e49d7ba2eef850d96b19d3998d71f7acca2c48ee6cdb47a4901622793f7a66e9
-
SHA512
f081f3602f1019f438c1784462f0a12f44b29b1adb9ddbb4f430146b5f974420ea5053d91b4a69b9c2bfad02bbf2e4b64790214ff8e585ce1dc082e91a76e768
-
SSDEEP
768:W8pjghrK5eEOyzNqi9UHjA7Vsc7vHFT35hcDCsjpRZd/aI:W8pjarK5eNH8X7vlTpCusjpRz/5
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4120 wrote to memory of 2964 4120 rundll32.exe 84 PID 4120 wrote to memory of 2964 4120 rundll32.exe 84 PID 4120 wrote to memory of 2964 4120 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e49d7ba2eef850d96b19d3998d71f7acca2c48ee6cdb47a4901622793f7a66e9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e49d7ba2eef850d96b19d3998d71f7acca2c48ee6cdb47a4901622793f7a66e9.dll,#12⤵PID:2964
-